Apply machine learning techniques to detect malicious network traffic in cloud computing

Abstract Computer networks target several kinds of attacks every hour and day; they evolved to make significant risks. They pass new attacks and trends; these attacks target every open port available on the network. Several tools are designed for this purpose, such as mapping networks and vulnerabil...

Full description

Bibliographic Details
Main Authors: Amirah Alshammari, Abdulaziz Aldribi
Format: Article
Language:English
Published: SpringerOpen 2021-06-01
Series:Journal of Big Data
Subjects:
IDS
Online Access:https://doi.org/10.1186/s40537-021-00475-1
id doaj-a8ef299d8c9f4bc1b0888f847b88fc00
record_format Article
spelling doaj-a8ef299d8c9f4bc1b0888f847b88fc002021-06-20T11:50:05ZengSpringerOpenJournal of Big Data2196-11152021-06-018112410.1186/s40537-021-00475-1Apply machine learning techniques to detect malicious network traffic in cloud computingAmirah Alshammari0Abdulaziz Aldribi1Department of Computer Science, College of Computer, Jouf UniversityDepartment of Computer Science, College of Computer, Qassim UniversityAbstract Computer networks target several kinds of attacks every hour and day; they evolved to make significant risks. They pass new attacks and trends; these attacks target every open port available on the network. Several tools are designed for this purpose, such as mapping networks and vulnerabilities scanning. Recently, machine learning (ML) is a widespread technique offered to feed the Intrusion Detection System (IDS) to detect malicious network traffic. The core of ML models’ detection efficiency relies on the dataset’s quality to train the model. This research proposes a detection framework with an ML model for feeding IDS to detect network traffic anomalies. This detection model uses a dataset constructed from malicious and normal traffic. This research’s significant challenges are the extracted features used to train the ML model about various attacks to distinguish whether it is an anomaly or regular traffic. The dataset ISOT-CID network traffic part uses for the training ML model. We added some significant column features, and we approved that feature supports the ML model in the training phase. The ISOT-CID dataset traffic part contains two types of features, the first extracted from network traffic flow, and the others computed in specific interval time. We also presented a novel column feature added to the dataset and approved that it increases the detection quality. This feature is depending on the rambling packet payload length in the traffic flow. Our presented results and experiment produced by this research are significant and encourage other researchers and us to expand the work as future work.https://doi.org/10.1186/s40537-021-00475-1IDSNetwork trafficFeature extractionDatasetMachine learning
collection DOAJ
language English
format Article
sources DOAJ
author Amirah Alshammari
Abdulaziz Aldribi
spellingShingle Amirah Alshammari
Abdulaziz Aldribi
Apply machine learning techniques to detect malicious network traffic in cloud computing
Journal of Big Data
IDS
Network traffic
Feature extraction
Dataset
Machine learning
author_facet Amirah Alshammari
Abdulaziz Aldribi
author_sort Amirah Alshammari
title Apply machine learning techniques to detect malicious network traffic in cloud computing
title_short Apply machine learning techniques to detect malicious network traffic in cloud computing
title_full Apply machine learning techniques to detect malicious network traffic in cloud computing
title_fullStr Apply machine learning techniques to detect malicious network traffic in cloud computing
title_full_unstemmed Apply machine learning techniques to detect malicious network traffic in cloud computing
title_sort apply machine learning techniques to detect malicious network traffic in cloud computing
publisher SpringerOpen
series Journal of Big Data
issn 2196-1115
publishDate 2021-06-01
description Abstract Computer networks target several kinds of attacks every hour and day; they evolved to make significant risks. They pass new attacks and trends; these attacks target every open port available on the network. Several tools are designed for this purpose, such as mapping networks and vulnerabilities scanning. Recently, machine learning (ML) is a widespread technique offered to feed the Intrusion Detection System (IDS) to detect malicious network traffic. The core of ML models’ detection efficiency relies on the dataset’s quality to train the model. This research proposes a detection framework with an ML model for feeding IDS to detect network traffic anomalies. This detection model uses a dataset constructed from malicious and normal traffic. This research’s significant challenges are the extracted features used to train the ML model about various attacks to distinguish whether it is an anomaly or regular traffic. The dataset ISOT-CID network traffic part uses for the training ML model. We added some significant column features, and we approved that feature supports the ML model in the training phase. The ISOT-CID dataset traffic part contains two types of features, the first extracted from network traffic flow, and the others computed in specific interval time. We also presented a novel column feature added to the dataset and approved that it increases the detection quality. This feature is depending on the rambling packet payload length in the traffic flow. Our presented results and experiment produced by this research are significant and encourage other researchers and us to expand the work as future work.
topic IDS
Network traffic
Feature extraction
Dataset
Machine learning
url https://doi.org/10.1186/s40537-021-00475-1
work_keys_str_mv AT amirahalshammari applymachinelearningtechniquestodetectmaliciousnetworktrafficincloudcomputing
AT abdulazizaldribi applymachinelearningtechniquestodetectmaliciousnetworktrafficincloudcomputing
_version_ 1721369645312638976